by Okta

Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the worlds largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, and Adobe trust Okta to work faster, boost revenue and stay secure.
Learn more about Okta

by Avast

Avast Business Antivirus Pro Plus is all-in-one powerful endpoint and server protection package for small and medium size businesses (best for 1-200 employees). Works on PCs, Macs and servers. The product is enhanced with 18 cutting - edge features to keep your corporate life fully secure, including server antivirus, network security, and on-the-go VPN protection.
It is just ultimate data, identity and endpoint protection.
It can be used without console, with cloud or on-premise console.
Learn more about Avast Business Antivirus Pro Plus

by Safer Social

Recognized as the leading business VPN, we offer a fast and cost-effective cloud service that ensures secure network access for businesses of all sizes. Deploy private VPN servers with dedicated IPs in a matter of seconds, manage multiple team members and say goodbye to expensive hardware, tedious installation and hours of help desk support. Includes a complete management portal and single-click apps for every device.
Learn more about Perimeter 81

by TitanHQ

DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Improve your cybersecurity now.
Try a free Trial of WebTitan today, support included.
Learn more about WebTitan

by ConnectWise

ConnectWise Automate, formerly LabTech is the only RMM platform designed to work the way you work, because it was built by a managed service provider (MSP) specifically for MSPs. Designed with cutting-edge agent technology, Automate delivers unprecedented centralized visibility into your clients IT systems. Its powerful built-in monitors alert you when IT issues are found, so you can resolve problems proactively, before they result in downtime for your clients. Start your free trial today!
Learn more about ConnectWise Automate

by Horangi Cyber Security

Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans.
Learn more about Horangi Web Security Services

by SolarWinds MSP

Remote Monitoring & Management is the number one remote management platform on the market for a reason: it gives you the most comprehensive set of tools to secure, maintain, and improve IT operations. The web-based console provides integrated patch management, antivirus, web content filtering, backup and recovery, remote access, automated monitoring and maintenance, and more. Automation capabilities allow routine tasks to be easily automated and robust reports deliver complete visibility.
Learn more about SolarWinds RMM

by SolarWinds

Delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-deploy virtual appliance.
Log & Event Manager automates and simplifies the complex task of security management, operational troubleshooting, and continuous compliance, enabling IT pros to immediately identify and re-mediate threats and vital network issues before critical systems and data can be exploited. SIEM software has never been easier to use or more affordable to own!
Learn more about Log & Event Manager

by Netikus.net

Award-winning, comprehensive and economical monitoring suite which ensures that all aspects of your IT infrastructure are secure and performing optimally. EventSentry includes
real-time event log, logfile, disk space, service, network, environment, Syslog/SNMP and performance monitoring. Customize depending on your needs - only enable the components you need. The built-in application scheduler allows easy integration of existing scripts. Download now and take charge of IT infrastructure today.
Learn more about EventSentry

by LogicMonitor

LogicMonitor is the SaaS-based, automated IT performance monitoring platform for on-premises, hybrid, and cloud infrastructures. LogicMonitor provides the end-to-end visibility needed to maintain the performance and availability of critical business applications. It leverages automation and built-in intelligence to monitor today's complex and distributed infrastructures.
Learn more about LogicMonitor

by Webroot Software

Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date.
Learn more about Webroot SecureAnywhere Endpoint Protection

by SUPERAntiSpyware

by Symantec

Protecting your data and information is our only concern. Its why Norton makes this bold promise to you: From the moment youre eligible for the Norton Virus Protection Promise, a Norton expert will help keep your devices virus-free or well refund your money.

by Dell

by RPost

RMail is an all-in-one service extension for powerful email, with simple-to-use open tracking, delivery proof, email encryption, electronic signatures, large file transfers and more. RMail provides a Registered Receipt record for every message sent, certifying delivery, time and content. RMail works with your existing email platform, including Microsoft Outlook and Gmail. Send to anyone using your existing email address. No special software or signups are needed on the recipient end.

by VIPole

VIPole is an encrypted communication platform for individuals, teams and companies. It delivers secure messaging, file sharing, calls and video conferencing as well as a whole host of collaboration tools for business, such an organizer, notes, daily planner and a password vault. Everything within the system is fully e2e encrypted in transit and at rest. A set of advanced admin tools enables centralized control and comprehensive user management for complete security.

by SiteLock

SiteLock is the Global Leader in website security, currently protecting more than five million websites. The company provides advanced, cloud-based security solutions for organizations of all sizes. SiteLock products include daily scanning with automatic malware removal, a managed web application firewall with a global CDN for a blazing fast website, advanced DDoS protection and an unrivaled 24/7 U.S. based phone support staff.

by Kerio Technologies

by Netmon

Netmon is a comprehensive network monitoring system featuring our proprietary high-performance traffic sniffing technology. Our combination of deep analysis and instant alerting make Netmon a complete solution for organizations who need to monitor the health and current status of mission-critical systems. Our product offerings combined with flexible licensing terms scale to put enterprise-level systems monitoring capabilities into the hands of small and medium-sized businesses.

by Kaspersky Lab

by LogMeIn

With the release of LogMeIn Central and LogMeIn Pro, LogMeIn's next generation solutions for remote access and systems management, LogMeIn IT Reach is no longer available to new customers. We will continue to support existing IT Reach customers and assist them with their transition over time to the new products.

by Corax

by Vormetric

Vormetric helps enterprises move confidently and quickly and create trust by securing data-at-rest across
all channels and environments. Knowing their data is secure, customers can respond faster and generate trust
between users and across channels, applications and environments. Vormetric helps make secure adoption
of new data environments a reality.

by Firetrust

by GFI Software

GFI LanGuard is a complete vulnerability management solution, which allows you to scan, detect, assess and rectify security vulnerabilities on your network. It also provides the tools to remediate vulnerabilities and install missing patches on the network. GFI LanGuard gives you a complete picture of your network set-up and helps you to maintain a secure network state faster and more effectively.

by DESlock

by LogPoint

The LogPoint SIEM solution intelligently extracts events and incidents from the billions of logs existing in any IT infrastructure of any size. Filtered and carefully correlated real-time results are displayed in easy to manage dashboards that can be configured based on the specific roles and responsibilities of each user.

by UpGuard

UpGuard is the company behind CSTAR, the world's only comprehensive and actionable cybersecurity preparedness score for enterprises. The score allows businesses to understand the risk of breaches and unplanned outages due to misconfigurations and software vulnerabilities. It also offers insurance carriers a new standard by which to effectively assess client risk and compliance profiles. UpGuard is headquartered in Mountain View, CA with offices in Portland, OR.

by BlueTalon

by Privatoria

Privatoria is an online service that secures web surfing protection and web traffic encryption. It is an online service which provides VPN, VPN Plus Tor, Anonymous Proxy and Tor web Proxy, that enable surf anonymously, change IP and unblock sites.

by Jscrambler

Jscrambler is the leader in security for JavaScript Applications, working on highly innovative security products to protect Web and Mobile apps. Their products are used by 30.000 users in 145 countries, including some of the most innovative companies in the world and Fortune 500 organizations, in a number of sectors including Finance, Advertising, Media and Gaming. Recently, a new Webpage Integrity module was introduced that extends their code protection expertize to the webpage.

by RG System

Manage your network and secure your business. RG SYSTEM is a Network Management Platform that allows you to Monitor, Supervise and Secure your network infrastructure. You can monitor your system, network and software layer. With RG SYSTEM you can install antivirus, anti spam, firewall and backup. You can also remote access any machine. Give more transparency to your clients as well. RG SYSTEM can also assist you through its Team As A Service. We can back you up when you need it the most.

by PrimeSoft Solutions

by REVE Antivirus

REVE Antivirus is a computer security software for home users & enterprises. It has many advanced features such as-Turbo Scan, Anti-Rootkit, Anti-Malware, Advanced Parental Control with Live Notification, Safe Browsing, Data Theft Protection & PC Tune Up.

by Netsweeper

Netsweeper Inc. provides web content filtering and web threat management that protects more than 50 million users worldwide. Netsweeper solutions ensure compliance with regulations, defend against web-based threats and help deliver a positive, productive and safe Internet experience. Netsweeper supports customers worldwide with offices in North America, the UK, the UAE, India and Australia as well as a network of partners and distributors.

by Ntrepid

Nfusion is the ultimate secure online environment for protecting your organization. Nfusion combines IP address attribution control with virtualization and other specialized features to camouflage your identity and protect your corporate IT assets from malware contagion. Nfusion provides a virtualized full Windows desktop. Both Windows 7 and 8 are available. Ntrepid can incorporate most Windows-compatible applications directly into the users virtual desktop.

by Barracuda Networks

The Barracuda Spam & Virus Firewall provides a powerful, easy-to-use and affordable solution for complete protection of an organization's email infrastructure. It eliminates spam and virus intrusions while safeguarding an organization's reputation through content inspection based on policy for both inbound and outbound email. Outbound filtering also prevents confidential or sensitive information from being purposely or inadvertently leaked outside the organization.

by Axence

Axence nVision is all-in-one, professional solution for comprehensive IT management. It responds to the key demands of administrators and CSOs in terms of network and user activity monitoring, hardware and software inventory, remote technical support and data leak protection. It also allows management boards to optimize the costs of servicing IT infrastructure, regardless of its size. Application consists of 5 modules and is free for up to 10 workstations with no time limits.

by ConnectWise

Server & network infrastructure provide the backbone for your clients' businesses & they depend on you to ensure its always available. As an IT service provider, if you are tasked with the mission critical functions of network & server management, you are responsible for detecting, troubleshooting and repairing faults; configuring services; controlling resource access; ensuring up-time & measuring performance. Automate collaborates with industry leaders to deliver the integrated tools you need.

by My Digital Shield

My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat management (UTM) technology, MDS' customizable cloud-based security solution offers continual protection against cyber threats and intrusion at an affordable price. Founded in 2013, MDS serves numerous managed service providers (MSPs) and small businesses in various industries.

by InfoExpress

by Wavecrest Computing

CyBlock is a reliable, cost-effective and schedulable Web access monitoring, control and filtering solution. For business use, it is available in three deployment options and it's easy to install, set up and use. Cyblock lets you apply different blocking policies to different groups in ways that curtail wasteful surfing, prevent bandwidth abuse and protect against security threats. It also provides a variety of tailorable Web-use reports and is backed by the vendor's skilled support team.

by Specops Software

You can use Specops Password Policy to enforce password rules, meet compliance requirements and help users select stronger passwords. Specops Password Policy extends the functionality of Group Policy and allows you to configure a different set of rules for different types of users.
Specops Password Policy is a component of the Specops Password Management solution. Specops Password Management addresses both security and flexibility needs by enabling organizations to reach their appropriate level

by GENIANS

Genian NAC helps maintain full visibility & control of all IT assets and ensures them to be the highest level of security and compliance through flexible deployment options (Cloud or on-prem).
Genian NAC also provides a consistent and reliable access experience to all authorized users and keeps non-compliant devices to the highest level of security compliance automatically through comprehensive IT management solution.

by PhishingBox

PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Our system is simple to use, cost-effective and helps clients reduce risk and achieve cyber security objectives.

by Temasoft

by Qualys

Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain.

by AuthenWare

AuthenWare is a leading cybersecurity software provider focused on fighting identity theft. The Company's innovative tokenless 2-factor authentication system delivers strong security through a combination of keystroke dynamics, behavioral and environmental characteristics to minimize identity theft, web fraud and other system vulnerabilities. The AuthenWare solution measures how a user types to ensure only authorized users access a system or web page, while stopping hackers and password sharing.

by Software602

by Global Information Technology

PrivacyKeyboard for Microsoft Windows 7/Vista/XP/2000, Microsoft Windows Server 2008/2003 is the first product of its kind in the world that can provide every computer with strong protection against ALL types of real spy programs and hardware keyloggers, both known and unknown, currently in use or presently being developed worldwide. Makes data stealing impossible.

by Cloudmark

by Pwnie Express

Pulse discovers, inventories and classifies all IT and IoT devices and builds a comprehensive identity for each device. Device discovery and classification is performed on a continual basis, without the need for agents or network changes. Pulse continually monitors the behavior of devices and associated systems for indicators of compromise or sabotage, then creates actionable intelligence for threats and risks. Respond directly from from Pulse to neutralize IoT device threats to your systems.

by ManageEngine

ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues.

by Tanium

by IDERA

DBAs need a powerful backup and recovery solution that greatly reduces backup and recovery time, minimizes storage requirements, and provides enterprise management capabilities to conduct backups across a large numbers of servers simultaneously. SQL Safe has been specifically designed to meet these requirements, resulting in increased application and business availability for your critical SQL Server infrastructure.

by Netskope

Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence.

by Distil Networks

Distil Networks is the first easy and accurate way to identify and police malicious malicious website traffic, blocking 99.9% of bad bots without impacting legitimate users. Distil also provides you with API security, real-time threat intelligence, and complete visibility and control over human, good bot, and bad bot traffic across your web infrastructure.

by Tresys

by Cimcor

Built around advanced file integrity monitoring technology, CimTrak can go beyond server monitoring detecting changes to network devices, databases, desktops/workstations, VMware ESX/ESXi hosts, and more, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure, maintain compliance with regulations such as the Payment Card Industry Standards (PCI-DSS), ensure continuous system uptime, and take control of changes in their IT environments.

by Visual Click Software

Receive comprehensive NTFS Permissions Reports for your servers + workstations. Easily audit file system permissions across your network. Includes hundreds of specific reports and features.
Simple and comprehensive delegation of Active Directory and File System duties via customizable Helpdesk applets. Does not use or require native AD delegation, uses an independent technology with full audit logs of each action, who performed and from where as well as when.

by Cossack Labs

We aim to mitigate risks in data security through the development of easy-to-use, cross-platform solutions that are designed to provide a simple means to protect data within corporate infrastructures or stand-alone applications and over both a distributed application setting and in the open Internet.

by Unistal Systems

Unistal has exerted full potential and developed superior recovery applications that restore deleted files. The diverse range of recovery applications include hard drive,mailbox,Raid Server data recoveries,email conversion (OST to PST , EDB to PST, NSF to PST), and file repairing software,and are also proficient in handling complex data recovery with cent percent absolute end results. All the applications are designed and developed at Unistal lab; incorporated with cutting edge technology.

by Code42

Code42 is a global enterprise SaaS provider of endpoint data protection and security to more than 37,000 organizations, including the most recognized brands in business and education. Our highly secure cloud solutions enable IT and security teams to limit risk, meet data privacy regulations and recover from data loss, no matter the cause.

by Splunk

by Cloudflare

Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.

by Beyond Security

The AVDS family of network vulnerability assessment and web application security testing solutions are the most accurate and easiest to use in the industry. AVDS is scalable in size 50 - 500,000 IPs. It will find, prioritize and manage the repair of security weaknesses in your network and web applications with the fast setup and the least upkeep possible. Behavior based scanning with zero false positives. Finds new active IPs, applications, Wireless Access Points. Sends no data out of network.

by Alert Logic

by Prival

Blesk is a suite of applications for network monitoring and management. It is comprised of a mix of open source and proprietary tools that come pre-installed and configured on an optimized 64-bit version of CentOS Linux.
Blesk integrates many popular tools including Nagios, Snort, Ntop, Cacti, Elasticsearch, Rancid, Netdisco, and GLPI. Each of these have been streamlined for optimal performance, and all run harmoniously on a single server.

by Authora

by Gemalto

SafeNet ProtectApp offers the highest level of application security available in a commercial encryption solution for business applications like CRM, ERP and human capital management (HCM). Data is secured transparently, without affecting application performance or the user experience. Centralized key and policy management provided with the integrated SafeNet DataSecure appliance enables administrators to support a large number of applications.

by Rockliffe Systems

MailSite Fusion is a windows email, calendar and contact server with over-the-air push to all types of smartphones, Full native Outlook sync, a sophisticated AJAX web client and a calendar and contact sharing server, which can synchronize and publish to many other clients. MailSite has been voted in the top 3 mail server products by readers of Windows IT Pro Magazine 3 years running.

by Protegrity

by Catbird

Catbird is a pioneer and leader in Software-Defined Segmentation and Security for the Hybrid IT Infrastructure. Catbirds software suite of products was designed from the ground up to provide visibility into and protection of private clouds and virtual Data Centers, and is available for both VMware and OpenStack.

by Vallum Software

The Vallum Halo Manager is a web based enterprise network monitoring solution. Vallum Halo is a simple install that will automatically discover all devices and immediately provide availability data and alerts. Installation of a free universal agent, included as part of the installation, will provide more extensive metrics on CPU, Memory, Disk, Network, processes and services.

by Data Encryption Systems

by Mission2Mars

DATA ROVER Effective Permissions is a structured product designed to make it easy for you to:
- analyze your file servers and shared file systems
- check and track file system permissions
- gain valuable knowledge on your business critical servers and data
DATA ROVER EP automates and actively makes the process of security analysis and permission reporting. It provides a scalable and cost-effective way of managing network data resources across the organization.

by BAE Systems

Our CyberReveal platform analyses the behaviour of devices on your network and their connections with the internet to pick out attacks from within legitimate network traffic. Skilled security analysts investigate suspicious activity and raise security incidents when you need to take action. Our Threat Intelligence function monitors key attack groups, ensuring that the latest techniques can be detected.

by FireEye

by NopSec

NopSec Unified Vulnerability Risk Management (VRM) helps you prioritize your risks after scanning (we are scanner agnostic) and subsequently helps you remediate the threats that matter the most. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence including malware, exploit, patching and social media feeds to predict the true probability of attacks.

by HelpSystems

Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity.

by IronCore Labs

by Parablu

BluKrypt is an on-premise CASB that completely secures your critical data on the cloud. Whether the data is in your collaboration tools, archive & backup platforms or SaaS applications, BluKrypt gives you total control over data security. BluKrypt acts as a secure cloud gateway to enable enterprises to fully manage security policy enforcement irrespective of where the digital assets are stored public cloud, private cloud or local data stores.
As opposed to other CASBs, which mainly rely on

by Appknox

by ChurchDNS

Protects networks through DNS filtering of inappropriate websites, blocking malware, and eliminating web based ads. Our 100% cloud based platform allows you to filter over 60+ categories covering more than 20+ Billion URLs. Solution provides easy one click network wide forced safe search and YouTube safe modes with G Suite support. Works great for both single and multi-campus deployments.

by NTP Software

With NTP Softwares File Auditor, you have an immediate view of who is accessing which documents across your entire storage environment. The view is in real time. This file auditing software gives you automatic reporting and auditing tools. These tools help you build an extra layer of security around your companys sensitive file data and intellectual property.

by Kiuwan

We provide an end-to-end Software Security platform to bring you objective data so you can make informed decisions regarding the security, risk, cost, activity, quality, maintainability, efficiency and dependencies of your applications.
We make tough decisions easier and this translates in cost reduction, risk mitigation, objective measurement, software technical security certifications and outsourcing agreement management, to name but a few of the possibilities brought about by our platform.

by Moonshot Technologies

by SecureNok

Secure-NOK offers SNOK, an easy-to-use, state-of-the-art tool for monitoring, detection, and early warning of cybersecurity events in industrial control and automation systems.
Through our products and services, Secure-NOK enables well-informed security decisions. We provide knowledge and awareness of security risks and their consequences and support our customers with holistic defense strategies and solutions.

by SentryBay

Desktop software designed to protect all data entered into web browsers. Protects all data entry including personal and financial information from malware/spyware/trojans and phishing attacks that attempt to steal confidential information. Works alongside all other security software such as anti-virus providing a real-time layer of protection for all data.

by Cigloo

CIGLOO is the next generation browser isolation management platform, It provides organizations with the ability to enforce web isolation and assures that all malicious browsers code, email links, files and browsers-based apps operate outside of the core network, ensuring the security of sensitive corporate data.

by Haystax Technology

Constellation enables organizations to move to a dynamic and predictive risk posture, make quicker decisions and speed remediation for more effective protection of their critical systems, data, facilities, and people. Instead of starting with a massive pool of data and then mining it for usable threat intelligence, we first build a system for transforming human expertise into models that can evaluate complex security problems.

by Spiceworks

Monitor all your devices easily and in one place! With Spiceworks Network Monitor you can keep an eye on your servers and SNMP-enabled devices like routers and switches from one dashboard. Youll have total visibility over your network, so you can catch issues before any of your users, and be the IT hero you were meant to be. After work hours, rely on email alerts to keep you updated of the critical issues affecting your systems. All of this, and its free! Download Network Monitor now.

by NordVPN

We help companies keep their networks and Internet connections secure. Our VPN service adds an extra layer of protection to secure your communications. We do this by applying strong encryption to all incoming and outgoing traffic so that no third parties can access your confidential information.
Protect your organization against security breaches.
Secure remote team access.
Simplify business network security.
Access region-specific online content from anywhere in the world

by Observable Networks

Endpoint modeling learns the behavior of every endpoint on your network, combines it with threat intelligence algorithms in the cloud, and monitors activity in real time allowing you to identify and remediate threats. With unprecedented visibility into your network, configurable alerts, and an intuitive UI, endpoint modeling closes the widening gaps left by traditional security methods.

by Free Connected

No Annoying Pop-up Ads! The best VPN to Enjoy Private, Secure surfing experience.Lightning fast connection.Easy to download and use across your devices.All you have to do is to tap the Connect button then you are protected.
Unblock All Websites And Apps
Change IP as you want
Secure Your Internet Activity And WiFi Connection.
Come to experience the real Trustworthy VPN service by the independent developer team!X-VPN Is Definitely Your Online Bodyguards!

by Marty Soft Conception

Secures and easily protects a Windows Remote Desktop Server against cyber criminals.
RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface.
Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access.

by SafeDNS

A DNS-based internet security and web filtering service providing a range of flexible, fast and reliable solutions for businesses and institutions of any size. Choose just the right SafeDNS solution for your industry or type of organization from a SMB to a multinational enterprise. Block botnets, malicious and phishing sites, web ads and unwanted online content such as pornography, violence, hate & racism, social media, gambling - in a word any inappropriate content.

by Ezeelogin

by AIONCLOUD

AIONCLOUD is a simple way to secure your website. AIONCLOUD is total web security service to safeguard websites from various attacks and improve your business performance. AIONCLOUD detects and blocks malicious activities and protects critical data from the latest threats such as SQL injection, DDos, homepage defacement, information leaks, identity theft and malware.

by DATCOM

by Zartech

Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution

by GOOSE

by Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea of Interactive Deception. The Ridgeback Interactive Deception Platform influences adversary behavior, leading the adversary to engage in behaviors that reveal malicious intent. Ridgeback creates the appearance of billions of unavoidable phantom resources in the network, each a landmine that stops lateral exploits in real time. Up and running in ten minutes.

by ITA Networks

by Invinsec

It doesnt matter what you buy..
Our technology sits on top of your existing systems.
We aggregate all of your technology systems into one Security Dashboard, giving you a real time and on demand view of your network
This real time view constantly monitors for potential threats, and compliance issues 24/7/365.
If we find something nasty we tell you. Our response speed is the fastest in the industry.
Its all designed to put you back in control (fast)

by G-TAC Software

by Sentinel

Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running.

by Comodo Group

Comodo cWatch Web is a Managed Security Service for websites and applications that combines a Web Application Firewall (WAF) provisioned over a Secure Content Delivery Network (CDN). It is a fully managed solution from a 24/7 staffed Cyber Security Operation Center (CSOC) of certified security analysts and is powered by a Security Information and Event Management (SIEM) that leverages data from over 85 million endpoints to detect and mitigate threats before they occur.

by CloudNow Technologies

Akku is a Cloud Access Security Broker (CASB) that acts as a gateway on the cloud to filter access based on authorization to various cloud applications. It can facilitate such as Single Sign-on (SSO), Blocking Consumer G Suite, IP Restriction, Customization of password policy, YouTube filtering, DNS filtering and Multi-factor authentication.
About CloudNow Technologies:
CloudNow Technologies (CNT) is a fast growing IT consuming and software development company founded in 2014.

by ProMDM

Web-based tool to manage and monitor digital certificates from Microsoft AD CS, but also other external PKI sources.

Why Capterra is Free

Capterra is free for users because vendors pay us when they receive web traffic and sales opportunities. Capterra lists all vendors - not just those that pay us - so that you can make the best-informed purchase decision possible.

We provide every vendor the opportunity to showcase their products and collect user reviews. Being the most comprehensive and helpful resource for software buyers has been our mission since we started in 1999. Our complete software lists, verified user reviews, sort and filter tools, and articles are all available to help in your task of finding the right solution for your needs.

Options for Sorting the Directory

Sponsored:
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest. Vendors who bid for placement can be identified by the orange “Visit Website” button on their listing.